Sciweavers

5722 search results - page 443 / 1145
» Security Function Interactions
Sort
View
EPEW
2007
Springer
15 years 10 months ago
Resource Sharing in Performance Models
In software systems, individual components interact not only through explicit function invocations, but also through implicit resource sharing. The use of shared resources signifi...
Vlastimil Babka, Martin Decký, Petr Tuma
BMCBI
2011
14 years 8 months ago
PRIN, a predicted rice interactome network
Background: Protein-protein interactions play a fundamental role in elucidating the molecular mechanisms of biomolecular function, signal transductions and metabolic pathways of l...
Haibin Gu, Pengcheng Zhu, Yinming Jiao, Yijun Meng...
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
16 years 5 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
CCS
2007
ACM
15 years 8 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
BIBE
2010
IEEE
135views Bioinformatics» more  BIBE 2010»
15 years 4 months ago
Finding Dynamic Modules of Biological Regulatory Networks
—Often groups of genes in regulatory networks, also called modules, work collaboratively on similar functions. Mathematically, the modules in a regulatory network has often been ...
Ferhat Ay, Thang N. Dinh, My T. Thai, Tamer Kahvec...